Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5803: Missing Authorization in e4jvikwp VikBooking Hotel Booking Engine & PMS

0
High
VulnerabilityCVE-2025-5803cvecve-2025-5803
Published: Thu Nov 06 2025 (11/06/2025, 15:54:18 UTC)
Source: CVE Database V5
Vendor/Project: e4jvikwp
Product: VikBooking Hotel Booking Engine & PMS

Description

Missing Authorization vulnerability in e4jvikwp VikBooking Hotel Booking Engine & PMS vikbooking.This issue affects VikBooking Hotel Booking Engine & PMS: from n/a through <= 1.8.2.

AI-Powered Analysis

AILast updated: 11/13/2025, 17:22:00 UTC

Technical Analysis

CVE-2025-5803 identifies a missing authorization vulnerability in the VikBooking Hotel Booking Engine & PMS, versions up to and including 1.8.2. This vulnerability arises because the application fails to properly verify whether a user has the necessary permissions before allowing access to certain functions or data. The flaw can be exploited remotely over the network (AV:N) with low attack complexity (AC:L), requiring only limited privileges (PR:L) and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), indicating that an attacker could access sensitive booking data, modify or delete records, and disrupt service availability. The vulnerability affects a critical component in the hospitality sector, responsible for managing hotel bookings and property management system (PMS) operations. Although no public exploits are currently known, the high CVSS score of 8.8 reflects the serious risk posed. The vulnerability was reserved in June 2025 and published in November 2025, indicating recent discovery. The lack of available patches at the time of reporting necessitates immediate mitigation efforts by affected organizations. The vulnerability’s exploitation could lead to unauthorized data access, manipulation of bookings, and potential denial of service, severely impacting hotel operations and customer trust.

Potential Impact

For European organizations, especially those in the hospitality and tourism sectors, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive customer data, including personal identification and payment information, violating GDPR and other data protection regulations. Integrity of booking and PMS data could be compromised, leading to fraudulent bookings, cancellations, or financial losses. Availability impacts could disrupt hotel operations, causing reputational damage and loss of revenue. Given the importance of tourism to many European economies, such disruptions could have broader economic consequences. Additionally, the breach of customer data could trigger regulatory fines and legal liabilities. Organizations using VikBooking PMS must consider the threat as critical to their operational security and compliance posture.

Mitigation Recommendations

1. Immediately audit and restrict user privileges within the VikBooking system to the minimum necessary, ensuring that only authorized personnel have access to sensitive functions. 2. Implement network segmentation and firewall rules to limit access to the PMS backend to trusted IP addresses and internal networks. 3. Monitor logs and system activity for unusual access patterns or privilege escalations indicative of exploitation attempts. 4. Engage with the vendor or community to obtain patches or updates addressing CVE-2025-5803 as soon as they become available. 5. Until patches are applied, consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized access attempts targeting the vulnerable endpoints. 6. Conduct regular security assessments and penetration testing focused on authorization controls within the PMS environment. 7. Educate staff on the importance of access controls and prompt reporting of suspicious system behavior. 8. Prepare incident response plans specific to PMS compromise scenarios to minimize impact if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-06T10:04:42.368Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc801ca26fb4dd2f593db

Added to database: 11/6/2025, 4:08:33 PM

Last enriched: 11/13/2025, 5:22:00 PM

Last updated: 11/22/2025, 6:36:09 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats